implements Quantum Electronic Voting
This protocol [1] implements the task of quantum E-voting. The participants in this family of protocols are one or more election authorities, the tallyer, and the voters. The election authorities are only trusted for the purpose of eligibility, and the voters do not share any entangled states with either the election authority (EA) or Tallier (T) to cast their ballots.
Verifiability: An adversary can change the vote of an eligible voter when the corresponding ballot is cast over the anonymous channel.
Privacy: EA can introduce a “serial number” in a blank ballot to identify a voter and therefore violate privacy.
Security: The security of the protocol relies on a quantum problem, named one-more-unforgeability, and the assumption that it is computationally hard for a quantum adversary.
No content has been added to this section, yet!
No content has been added to this section, yet!
implements Quantum Electronic Voting
This protocol [1] implements the task of quantum E-voting. The participants in this family of protocols are one or more election authorities, the tallyer, and the voters. The election authorities are only trusted for the purpose of eligibility, and the voters do not share any entangled states with either the election authority (EA) or Tallier (T) to cast their ballots.
Verifiability: An adversary can change the vote of an eligible voter when the corresponding ballot is cast over the anonymous channel.
Privacy: EA can introduce a “serial number” in a blank ballot to identify a voter and therefore violate privacy.
Security: The security of the protocol relies on a quantum problem, named one-more-unforgeability, and the assumption that it is computationally hard for a quantum adversary.
No content has been added to this section, yet!
No content has been added to this section, yet!
implements Quantum Electronic Voting
This protocol [1] implements the task of quantum E-voting. The participants in this family of protocols are one or more election authorities, the tallyer, and the voters. The election authorities are only trusted for the purpose of eligibility, and the voters do not share any entangled states with either the election authority (EA) or Tallier (T) to cast their ballots.
Verifiability: An adversary can change the vote of an eligible voter when the corresponding ballot is cast over the anonymous channel.
Privacy: EA can introduce a “serial number” in a blank ballot to identify a voter and therefore violate privacy.
Security: The security of the protocol relies on a quantum problem, named one-more-unforgeability, and the assumption that it is computationally hard for a quantum adversary.
No content has been added to this section, yet!
No content has been added to this section, yet!